A Gift Of Fire Social Legal And Ethical Issues For Computing Technology 4th Edition By Sara Baase – Test Bank
Chapter 4
1. Which of the following is not an exclusive right (subject to some exceptions) granted by copyright law?
(a) Copy the work
(b) Distribute the work
(c) Profit from the work
(d) Create “derivative works”
Correct answer: c – pg 181
2. Which of the following is not a factor specified in U.S. copyright law for determining fair use?
(a) The purpose and nature of the use
(b) The amount and significance of the portion used
(c) The effect on the market for the copyrighted work
(d) The for-profit or non-profit status of the copyright holder
Correct answer: d – pg 186-187
3. In the term “Free Software,” “free” implies all of the following except one. Which one?
(a) Free of cost
(b) Free to copy
(c) Freedom
(d) Free to modify
Correct answer: a – pg 211
4. One of the reasons the court ruled against Napster was:
(a) It knowingly encouraged and assisted in the infringement of copyrights
(b) It knowingly stored illegal copies of files on its server
(c) It knowingly used technology protected by patent
(d) All of the above
Correct answer: a – pg 192
5. When was the first U.S. copyright law passed?
(a) In 1790
(b) In 1970
(c) In 1908
(d) In 1880
Correct answer: a – pg 185
Chapter 5
1. Which of the following is an example of biometrics:
(a) DNA
(b) Fingerprints
(c) Voice prints
(d) All of the above
Correct answer: d – pg 257-258
2. In the early days of computing (1960’s to the early 1970’s), a “hacker” was:
(a) An incompetent programmer who wrote programs that did not work properly
(b) A busy programmer who reused code to save time
(c) A creative programmer who wrote very elegant or clever programs
(d) A new programmer who wrote simple programs
Correct answer: c – pg 231
3. Hacktivism is:
(a) A political activist group promoting tougher anti-hacking laws
(b) The counter-hacking techniques used by the FBI and other law enforcement agencies
(c) The use of hacking to promote a political cause
(d) A newsletter for hackers
Correct answer: c – pg 236
4. Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as:
(a) Honey pots
(b) Digital surveillance
(c) Computer entrapment
(d) Hacker crackdown
Correct answer: a – pg 246
5. Which of the following is NOT a program used by hackers to gain access to your computer:
(a) Keyloggers
(b) Trojans
(c) Rootkits
(d) Honey pots
Correct answer: d – pg 246
6. In 2000, a French court ordered Yahoo! to block access by French people to
(a) Web sites containing pornography
(b) an Al Qaeda training manual
(c) online auction sites containing Nazi materials
(d) a Web site containing instructions for making bombs
Correct answer: c – pg 260-261
Chapter 6
1. Which of the following reasons for monitoring email, voice mail, and computer files is considered legal?
(a) Protect security of proprietary information and data
(b) Investigate complaints of harassment
(c) Prevent personal use of employer facilities if prohibited by company policy
(d) All of the above
Correct answer: d – pg 300-301
2. The practice of hiring companies or employees in other countries is known as:
(a) Offshoring
(b) Globalization
(c) Downsizing
(d) None of the above
Correct answer: a – pg 276
Chapter 7
1. Which of the following is NOT a Neo-Luddite criticism of computers?
(a) Use of computers in schools thwarts development of social skills
(b) Computers separate humans from nature and destroy the environment
(c) Computers cause social inequity
(d) None of the above
Correct answer: d – pg 334
2. Ken Olson, president of Digital Equipment Corp. in the late 1970’s, Thomas J. Watson, chairman of IBM in the early 1940’s, and Thomas Edison all made predictions about technology that were extremely wrong. Which of the following explains why the predictions of experts are often so far off?
(a) Lack of imagination about the uses people would find for technology
(b) Lack of imagination about what the public would like
(c) Lack of imagination about what the public would pay for
(d) All of the above
Correct answer: d – pg 344-347
Chapter 8
1. Most of the delay in the opening of the Denver International Airport was because of problems with
(a) the air traffic control system
(b) the environmental monitoring systems
(c) the baggage handling system
(d) the telephone and communications systems
Correct answer: c – pg 371-373
2. One of the sources of failure common to BOTH the Therac-25 and the Ariane 5 rocket was
(a) confusing and poorly-documented error messages
(b) poor human-computer interface design
(c) operator error
(d) reuse of software from previous versions of the systems
Correct answer: d – pg 377 and 378-379
3. Which of the following occupations can sometimes cause Repetitive Strain Injuries (RSI)?
(a) Sign-language interpreter for the deaf
(b) Musician
(c) Computer programmer
(d) All of the above
Correct answer: d -pg 368
Chapter 9
1. In one application of a voice-recognition system, the system failed to recognize female speakers. A likely reason was
(a) The program was specifically designed for men
(b) Women’s voices are inherently harder to recognize
(c) Women do not speak as loudly as men, and the system used inferior microphones
(d) The program was primarily developed and tested by men
Correct answer: d – pg 409
2. Which of the following is NOT a principle for producing good systems?
(a) Understand what success means
(b) Include users in the design and testing stages
(c) Be open and honest about capabilities, safety, and limitations of software
(d) Overestimate the costs and time a project will take
Correct answer: d – pg 407-410
Reviews
There are no reviews yet.